Git Product home page Git Product logo

ssri's Introduction

ssri npm version license Travis AppVeyor Coverage Status

ssri, short for Standard Subresource Integrity, is a Node.js utility for parsing, manipulating, serializing, generating, and verifying Subresource Integrity hashes.

Install

$ npm install --save ssri

Table of Contents

Example

const ssri = require('ssri')

const integrity = 'sha512-9KhgCRIx/AmzC8xqYJTZRrnO8OW2Pxyl2DIMZSBOr0oDvtEFyht3xpp71j/r/pAe1DM+JI/A+line3jUBgzQ7A==?foo'

// Parsing and serializing
const parsed = ssri.parse(integrity)
ssri.stringify(parsed) // === integrity (works on non-Integrity objects)
parsed.toString() // === integrity

// Async stream functions
ssri.checkStream(fs.createReadStream('./my-file'), integrity).then(...)
ssri.fromStream(fs.createReadStream('./my-file')).then(sri => {
  sri.toString() === integrity
})
fs.createReadStream('./my-file').pipe(ssri.createCheckerStream(sri))

// Sync data functions
ssri.fromData(fs.readFileSync('./my-file')) // === parsed
ssri.checkData(fs.readFileSync('./my-file'), integrity) // => 'sha512'

Features

  • Parses and stringifies SRI strings.
  • Generates SRI strings from raw data or Streams.
  • Strict standard compliance.
  • ?foo metadata option support.
  • Multiple entries for the same algorithm.
  • Object-based integrity hash manipulation.
  • Small footprint: no dependencies, concise implementation.
  • Full test coverage.
  • Customizable algorithm picker.

Contributing

The ssri team enthusiastically welcomes contributions and project participation! There's a bunch of things you can do if you want to contribute! The Contributor Guide has all the information you need for everything from reporting bugs to contributing entire new features. Please don't hesitate to jump in if you'd like to, or even ask us questions if something isn't clear.

API

> ssri.parse(sri, [opts]) -> Integrity

Parses sri into an Integrity data structure. sri can be an integrity string, an Hash-like with digest and algorithm fields and an optional options field, or an Integrity-like object. The resulting object will be an Integrity instance that has this shape:

{
  'sha1': [{algorithm: 'sha1', digest: 'deadbeef', options: []}],
  'sha512': [
    {algorithm: 'sha512', digest: 'c0ffee', options: []},
    {algorithm: 'sha512', digest: 'bad1dea', options: ['foo']}
  ],
}

If opts.single is truthy, a single Hash object will be returned. That is, a single object that looks like {algorithm, digest, options}, as opposed to a larger object with multiple of these.

If opts.strict is truthy, the resulting object will be filtered such that it strictly follows the Subresource Integrity spec, throwing away any entries with any invalid components. This also means a restricted set of algorithms will be used -- the spec limits them to sha256, sha384, and sha512.

Strict mode is recommended if the integrity strings are intended for use in browsers, or in other situations where strict adherence to the spec is needed.

Example
ssri.parse('sha512-9KhgCRIx/AmzC8xqYJTZRrnO8OW2Pxyl2DIMZSBOr0oDvtEFyht3xpp71j/r/pAe1DM+JI/A+line3jUBgzQ7A==?foo') // -> Integrity object

> ssri.stringify(sri, [opts]) -> String

This function is identical to Integrity#toString(), except it can be used on any object that parse can handle -- that is, a string, an Hash-like, or an Integrity-like.

The opts.sep option defines the string to use when joining multiple entries together. To be spec-compliant, this must be whitespace. The default is a single space (' ').

If opts.strict is true, the integrity string will be created using strict parsing rules. See ssri.parse.

Example
// Useful for cleaning up input SRI strings:
ssri.stringify('\n\rsha512-foo\n\t\tsha384-bar')
// -> 'sha512-foo sha384-bar'

// Hash-like: only a single entry.
ssri.stringify({
  algorithm: 'sha512',
  digest:'9KhgCRIx/AmzC8xqYJTZRrnO8OW2Pxyl2DIMZSBOr0oDvtEFyht3xpp71j/r/pAe1DM+JI/A+line3jUBgzQ7A==',
  options: ['foo']
})
// ->
// 'sha512-9KhgCRIx/AmzC8xqYJTZRrnO8OW2Pxyl2DIMZSBOr0oDvtEFyht3xpp71j/r/pAe1DM+JI/A+line3jUBgzQ7A==?foo'

// Integrity-like: full multi-entry syntax. Similar to output of `ssri.parse`
ssri.stringify({
  'sha512': [
    {
      algorithm: 'sha512',
      digest:'9KhgCRIx/AmzC8xqYJTZRrnO8OW2Pxyl2DIMZSBOr0oDvtEFyht3xpp71j/r/pAe1DM+JI/A+line3jUBgzQ7A==',
      options: ['foo']
    }
  ]
})
// ->
// 'sha512-9KhgCRIx/AmzC8xqYJTZRrnO8OW2Pxyl2DIMZSBOr0oDvtEFyht3xpp71j/r/pAe1DM+JI/A+line3jUBgzQ7A==?foo'

> Integrity#concat(otherIntegrity, [opts]) -> Integrity

Concatenates an Integrity object with another IntegrityLike, or an integrity string.

This is functionally equivalent to concatenating the string format of both integrity arguments, and calling ssri.parse on the new string.

If opts.strict is true, the new Integrity will be created using strict parsing rules. See ssri.parse.

Example
// This will combine the integrity checks for two different versions of
// your index.js file so you can use a single integrity string and serve
// either of these to clients, from a single `<script>` tag.
const desktopIntegrity = ssri.fromData(fs.readFileSync('./index.desktop.js'))
const mobileIntegrity = ssri.fromData(fs.readFileSync('./index.mobile.js'))

// Note that browsers (and ssri) will succeed as long as ONE of the entries
// for the *prioritized* algorithm succeeds. That is, in order for this fallback
// to work, both desktop and mobile *must* use the same `algorithm` values.
desktopIntegrity.concat(mobileIntegrity)

> Integrity#merge(otherIntegrity, [opts])

Safely merges another IntegrityLike or integrity string into an Integrity object.

If the other integrity value has any algorithms in common with the current object, then the hash digests must match, or an error is thrown.

Any new hashes will be added to the current object's set.

This is useful when an integrity value may be upgraded with a stronger algorithm, you wish to prevent accidentally suppressing integrity errors by overwriting the expected integrity value.

Example
const data = fs.readFileSync('data.txt')

// integrity.txt contains 'sha1-X1UT+IIv2+UUWvM7ZNjZcNz5XG4='
// because we were young, and didn't realize sha1 would not last
const expectedIntegrity = ssri.parse(fs.readFileSync('integrity.txt', 'utf8'))
const match = ssri.checkData(data, expectedIntegrity, {
  algorithms: ['sha512', 'sha1']
})
if (!match) {
  throw new Error('data corrupted or something!')
}

// get a stronger algo!
if (match && match.algorithm !== 'sha512') {
  const updatedIntegrity = ssri.fromData(data, { algorithms: ['sha512'] })
  expectedIntegrity.merge(updatedIntegrity)
  fs.writeFileSync('integrity.txt', expectedIntegrity.toString())
  // file now contains
  // 'sha1-X1UT+IIv2+UUWvM7ZNjZcNz5XG4= sha512-yzd8ELD1piyANiWnmdnpCL5F52f10UfUdEkHywVZeqTt0ymgrxR63Qz0GB7TKPoeeZQmWCaz7T1+9vBnypkYWg=='
}

> Integrity#toString([opts]) -> String

Returns the string representation of an Integrity object. All hash entries will be concatenated in the string by opts.sep, which defaults to ' '.

If you want to serialize an object that didn't come from an ssri function, use ssri.stringify().

If opts.strict is true, the integrity string will be created using strict parsing rules. See ssri.parse.

Example
const integrity = 'sha512-9KhgCRIx/AmzC8xqYJTZRrnO8OW2Pxyl2DIMZSBOr0oDvtEFyht3xpp71j/r/pAe1DM+JI/A+line3jUBgzQ7A==?foo'

ssri.parse(integrity).toString() === integrity

> Integrity#toJSON() -> String

Returns the string representation of an Integrity object. All hash entries will be concatenated in the string by ' '.

This is a convenience method so you can pass an Integrity object directly to JSON.stringify. For more info check out toJSON() behavior on mdn.

Example
const integrity = '"sha512-9KhgCRIx/AmzC8xqYJTZRrnO8OW2Pxyl2DIMZSBOr0oDvtEFyht3xpp71j/r/pAe1DM+JI/A+line3jUBgzQ7A==?foo"'

JSON.stringify(ssri.parse(integrity)) === integrity

> Integrity#match(sri, [opts]) -> Hash | false

Returns the matching (truthy) hash if Integrity matches the argument passed as sri, which can be anything that parse will accept. opts will be passed through to parse and pickAlgorithm().

Example
const integrity = 'sha512-9KhgCRIx/AmzC8xqYJTZRrnO8OW2Pxyl2DIMZSBOr0oDvtEFyht3xpp71j/r/pAe1DM+JI/A+line3jUBgzQ7A=='

ssri.parse(integrity).match(integrity)
// Hash {
//   digest: '9KhgCRIx/AmzC8xqYJTZRrnO8OW2Pxyl2DIMZSBOr0oDvtEFyht3xpp71j/r/pAe1DM+JI/A+line3jUBgzQ7A=='
//   algorithm: 'sha512'
// }

ssri.parse(integrity).match('sha1-deadbeef')
// false

> Integrity#pickAlgorithm([opts]) -> String

Returns the "best" algorithm from those available in the integrity object.

If opts.pickAlgorithm is provided, it will be passed two algorithms as arguments. ssri will prioritize whichever of the two algorithms is returned by this function. Note that the function may be called multiple times, and it must return one of the two algorithms provided. By default, ssri will make a best-effort to pick the strongest/most reliable of the given algorithms. It may intentionally deprioritize algorithms with known vulnerabilities.

Example
ssri.parse('sha1-WEakDigEST sha512-yzd8ELD1piyANiWnmdnpCL5F52f10UfUdEkHywVZeqTt0ymgrxR63Qz0GB7TKPoeeZQmWCaz7T1').pickAlgorithm() // sha512

> Integrity#hexDigest() -> String

Integrity is assumed to be either a single-hash Integrity instance, or a Hash instance. Returns its digest, converted to a hex representation of the base64 data.

Example
ssri.parse('sha1-deadbeef').hexDigest() // '75e69d6de79f'

> ssri.fromHex(hexDigest, algorithm, [opts]) -> Integrity

Creates an Integrity object with a single entry, based on a hex-formatted hash. This is a utility function to help convert existing shasums to the Integrity format, and is roughly equivalent to something like:

algorithm + '-' + Buffer.from(hexDigest, 'hex').toString('base64')

opts.options may optionally be passed in: it must be an array of option strings that will be added to all generated integrity hashes generated by fromData. This is a loosely-specified feature of SRIs, and currently has no specified semantics besides being ?-separated. Use at your own risk, and probably avoid if your integrity strings are meant to be used with browsers.

If opts.strict is true, the integrity object will be created using strict parsing rules. See ssri.parse.

If opts.single is true, a single Hash object will be returned.

Example
ssri.fromHex('75e69d6de79f', 'sha1').toString() // 'sha1-deadbeef'

> ssri.fromData(data, [opts]) -> Integrity

Creates an Integrity object from either string or Buffer data, calculating all the requested hashes and adding any specified options to the object.

opts.algorithms determines which algorithms to generate hashes for. All results will be included in a single Integrity object. The default value for opts.algorithms is ['sha512']. All algorithm strings must be hashes listed in crypto.getHashes() for the host Node.js platform.

opts.options may optionally be passed in: it must be an array of option strings that will be added to all generated integrity hashes generated by fromData. This is a loosely-specified feature of SRIs, and currently has no specified semantics besides being ?-separated. Use at your own risk, and probably avoid if your integrity strings are meant to be used with browsers.

If opts.strict is true, the integrity object will be created using strict parsing rules. See ssri.parse.

Example
const integrityObj = ssri.fromData('foobarbaz', {
  algorithms: ['sha256', 'sha384', 'sha512']
})
integrity.toString('\n')
// ->
// sha256-l981iLWj8kurw4UbNy8Lpxqdzd7UOxS50Glhv8FwfZ0=
// sha384-irnCxQ0CfQhYGlVAUdwTPC9bF3+YWLxlaDGM4xbYminxpbXEq+D+2GCEBTxcjES9
// sha512-yzd8ELD1piyANiWnmdnpCL5F52f10UfUdEkHywVZeqTt0ymgrxR63Qz0GB7TKPoeeZQmWCaz7T1+9vBnypkYWg==

> ssri.fromStream(stream, [opts]) -> Promise<Integrity>

Returns a Promise of an Integrity object calculated by reading data from a given stream.

It accepts both opts.algorithms and opts.options, which are documented as part of ssri.fromData.

Additionally, opts.Promise may be passed in to inject a Promise library of choice. By default, ssri will use Node's built-in Promises.

If opts.strict is true, the integrity object will be created using strict parsing rules. See ssri.parse.

Example
ssri.fromStream(fs.createReadStream('index.js'), {
  algorithms: ['sha1', 'sha512']
}).then(integrity => {
  return ssri.checkStream(fs.createReadStream('index.js'), integrity)
}) // succeeds

> ssri.create([opts]) -> <Hash>

Returns a Hash object with update(<Buffer or string>[,enc]) and digest() methods.

The Hash object provides the same methods as crypto class Hash. digest() accepts no arguments and returns an Integrity object calculated by reading data from calls to update.

It accepts both opts.algorithms and opts.options, which are documented as part of ssri.fromData.

If opts.strict is true, the integrity object will be created using strict parsing rules. See ssri.parse.

Example
const integrity = ssri.create().update('foobarbaz').digest()
integrity.toString()
// ->
// sha512-yzd8ELD1piyANiWnmdnpCL5F52f10UfUdEkHywVZeqTt0ymgrxR63Qz0GB7TKPoeeZQmWCaz7T1+9vBnypkYWg==

> ssri.checkData(data, sri, [opts]) -> Hash|false

Verifies data integrity against an sri argument. data may be either a String or a Buffer, and sri can be any subresource integrity representation that ssri.parse can handle.

If verification succeeds, checkData will return the name of the algorithm that was used for verification (a truthy value). Otherwise, it will return false.

If opts.pickAlgorithm is provided, it will be used by Integrity#pickAlgorithm when deciding which of the available digests to match against.

If opts.error is true, and verification fails, checkData will throw either an EBADSIZE or an EINTEGRITY error, instead of just returning false.

Example
const data = fs.readFileSync('index.js')
ssri.checkData(data, ssri.fromData(data)) // -> 'sha512'
ssri.checkData(data, 'sha256-l981iLWj8kurw4UbNy8Lpxqdzd7UOxS50Glhv8FwfZ0')
ssri.checkData(data, 'sha1-BaDDigEST') // -> false
ssri.checkData(data, 'sha1-BaDDigEST', {error: true}) // -> Error! EINTEGRITY

> ssri.checkStream(stream, sri, [opts]) -> Promise<Hash>

Verifies the contents of stream against an sri argument. stream will be consumed in its entirety by this process. sri can be any subresource integrity representation that ssri.parse can handle.

checkStream will return a Promise that either resolves to the Hash that succeeded verification, or, if the verification fails or an error happens with stream, the Promise will be rejected.

If the Promise is rejected because verification failed, the returned error will have err.code as EINTEGRITY.

If opts.size is given, it will be matched against the stream size. An error with err.code EBADSIZE will be returned by a rejection if the expected size and actual size fail to match.

If opts.pickAlgorithm is provided, it will be used by Integrity#pickAlgorithm when deciding which of the available digests to match against.

Example
const integrity = ssri.fromData(fs.readFileSync('index.js'))

ssri.checkStream(
  fs.createReadStream('index.js'),
  integrity
)
// ->
// Promise<{
//   algorithm: 'sha512',
//   digest: 'sha512-yzd8ELD1piyANiWnmdnpCL5F52f10UfUdEkHywVZeqTt0ymgrxR63Qz0GB7TKPoeeZQmWCaz7T1'
// }>

ssri.checkStream(
  fs.createReadStream('index.js'),
  'sha256-l981iLWj8kurw4UbNy8Lpxqdzd7UOxS50Glhv8FwfZ0'
) // -> Promise<Hash>

ssri.checkStream(
  fs.createReadStream('index.js'),
  'sha1-BaDDigEST'
) // -> Promise<Error<{code: 'EINTEGRITY'}>>

> integrityStream([opts]) -> IntegrityStream

Returns a Transform stream that data can be piped through in order to generate and optionally check data integrity for piped data. When the stream completes successfully, it emits size and integrity events, containing the total number of bytes processed and a calculated Integrity instance based on stream data, respectively.

If opts.algorithms is passed in, the listed algorithms will be calculated when generating the final Integrity instance. The default is ['sha512'].

If opts.single is passed in, a single Hash instance will be returned.

If opts.integrity is passed in, it should be an integrity value understood by parse that the stream will check the data against. If verification succeeds, the integrity stream will emit a verified event whose value is a single Hash object that is the one that succeeded verification. If verification fails, the stream will error with an EINTEGRITY error code.

If opts.size is given, it will be matched against the stream size. An error with err.code EBADSIZE will be emitted by the stream if the expected size and actual size fail to match.

If opts.pickAlgorithm is provided, it will be passed two algorithms as arguments. ssri will prioritize whichever of the two algorithms is returned by this function. Note that the function may be called multiple times, and it must return one of the two algorithms provided. By default, ssri will make a best-effort to pick the strongest/most reliable of the given algorithms. It may intentionally deprioritize algorithms with known vulnerabilities.

Example
const integrity = ssri.fromData(fs.readFileSync('index.js'))
fs.createReadStream('index.js')
.pipe(ssri.integrityStream({integrity}))

ssri's People

Contributors

ahmedwelhakim avatar claudiahdz avatar dependabot[bot] avatar github-actions[bot] avatar h4ad avatar isaacs avatar lewish avatar lukekarrys avatar nlf avatar soldair avatar striezel avatar wraithgar avatar zkat avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

ssri's Issues

Trying to get in touch regarding a security issue

Hey there!

I'd like to report a security issue but cannot find contact instructions on your repository.

If not a hassle, might you kindly add a SECURITY.md file with an email, or another contact method? GitHub recommends this best practice to ensure security issues are responsibly disclosed, and it would serve as a simple instruction for security researchers in the future.

Thank you for your consideration, and I look forward to hearing from you!

(cc @huntr-helper)

[FEATURE] Better error reporting

What / Why

It's very hard to track what package's checksum don't match.

When

When npm installing you get an error that checksum X doesn't equal Y. But as a user installing npm packages, I have no idea what package that is or where to begin even looking at what packages are affected by this.

troy.steuwer$ npm i
Unhandled rejection Error: sha1-XdLz2PU4Q96X5WEv0OKThCSSeMk= integrity checksum failed when using sha1: wanted sha1-XdLz2PU4Q96X5WEv0OKThCSSeMk= but got sha512-SgGTC13n8IEewBTuX1rPMF7C8q7DAxvLdvch9hSknGYow/+/fqiw3umKSj3QrPcLwjkKmhZ2s4/KiuWthKf1vg== sha1-IE9YlDrHDPZbo29tfhu7U6fOWqI=. (177354 bytes)
    at Transform.on (/usr/local/lib/node_modules/npm/node_modules/ssri/index.js:310:19)
    at Transform.emit (events.js:187:15)
    at endReadableNT (_stream_readable.js:1085:12)
    at process._tickCallback (internal/process/next_tick.js:63:19)

Where

  • n/a

How

Current Behavior

  • It just tells you checksums on something don't match.

Expected Behavior

  • Displays the checksums don't match on a specific package and what exactly that package is.

Who

  • n/a

References

  • n/a

Reporting a vulnerability

Hello!

I hope you are doing well!

We are a security research team. Our tool automatically detected a vulnerability in this repository. We want to disclose it responsibly. GitHub has a feature called Private vulnerability reporting, which enables security research to privately disclose a vulnerability. Unfortunately, it is not enabled for this repository.

Can you enable it, so that we can report it?

Thanks in advance!

PS: you can read about how to enable private vulnerability reporting here: https://docs.github.com/en/code-security/security-advisories/repository-security-advisories/configuring-private-vulnerability-reporting-for-a-repository

Cannot read property 'pickAlgorithm' of null

Hi

I am doing a npm install of a custom package, which internally is using ssri, and is failing at below line:

3672 timing reifyNode:node_modules/rxjs Completed in 11639ms
3673 timing reify:rollback:createSparse Completed in 7383ms
3674 timing reify:rollback:retireShallow Completed in 0ms
3675 timing command:install Completed in 31124ms
3676 verbose stack TypeError: Cannot read property 'pickAlgorithm' of null
3676 verbose stack     at Integrity.match (C:\Users\srvacctivpreal\AppData\Roaming\npm\node_modules\npm\node_modules\ssri\index.js:234:24)
3676 verbose stack     at CachePolicy.satisfies (C:\Users\srvacctivpreal\AppData\Roaming\npm\node_modules\npm\node_modules\make-fetch-happen\lib\cache\policy.js:113:49)
3676 verbose stack     at Function.find (C:\Users\srvacctivpreal\AppData\Roaming\npm\node_modules\npm\node_modules\make-fetch-happen\lib\cache\entry.js:172:25)
3677 verbose cwd E:\IVPDealPlatform\services\core\apps
3678 verbose Windows_NT 10.0.14393
3679 verbose argv "C:\\Program Files\\nodejs\\node.exe" "C:\\Users\\srvacctivpreal\\AppData\\Roaming\\npm\\node_modules\\npm\\bin\\npm-cli.js" "i" "file:../../../dependencies/apps/start/start-v3-master-deb.tar.gz"
3680 verbose node v10.22.0
3681 verbose npm  v8.0.0
3682 error Cannot read property 'pickAlgorithm' of null
3683 verbose exit 1

Can you please guide to what could be the issue?

My npm version is: 7.24.2
My node version is: 12.18.3

[BUG] Integrity#match doesn't always find common algorithm

Is there an existing issue for this?

  • I have searched the existing issues

Current Behavior

An input containing both sha1+sha512 matches an input with only sha1, but not vice versa:

const ssri = require('ssri')

const sha1 = 'sha1-X1UT+IIv2+UUWvM7ZNjZcNz5XG4='
const sha512 = 'sha512-yzd8ELD1piyANiWnmdnpCL5F52f10UfUdEkHywVZeqTt0ymgrxR63Qz0GB7TKPoeeZQmWCaz7T1+9vBnypkYWg=='
const both = sha1 + ' ' + sha512

// returns truthy
console.log('both,sha1=', ssri.parse(both).match(sha1))
// returns false
console.log('sha1,both=', ssri.parse(sha1).match(both))

Expected Behavior

I would have expected both calls to return a truthy value, since they have an algorithm in common, and the hash matches.

Steps To Reproduce

No response

Environment

  • ssri: 9.0.1
  • Node: 16.15.1

npm install ssri - EINTEGRITY error

Trying to install ssri, gets EINTEGRITY ERROR. Node 6.17.1

% npm install ssri

verbose stack Error: sha1-mBrhQVufs3KuFfEVbV0yt9zHi90= integrity checksum failed when using sha1: wanted sha1-mBrhQVufs3KuFfEVbV0yt9zHi90= but got sha512-fFUdiIir8CBx5sEToEQKRfodXXB9FaIY3G8EObFovG01iN8iLSqELh1f2gYaCmnmilDFYvXWsG7YqbBfo3u/cg== sha1-1mJPy4IQpFl4civGKyIUYHaCHW8=. (16984 bytes)

Tried to clear caches for npm and nvm, no luck.

proper way to represent "sha3-512" as an algorithm?

When this module was written, the sha3 functions were not implemented in Node.js yet.

The hash name in Node v12 is sha3-512. However, that produces this weird result:

> ssri.fromData('foobarbaz', { algorithms: ['sha3-512']}).toString()
'sha3-512-snSuhcONR8xNX+Usuq3shckgiM1uxtrBLbNhiczHceXymkQdzueWJWAbAZlc9YktDoN58paVsz8Fc5AwJCkLxQ=='

I'm not sure if the - there is appropriate. If it is, then certainly this is wrong:

> ssri.fromData('foobarbaz', { algorithms: ['sha3-512']})
Integrity {
  sha3: [
    Hash {
      source: 'sha3-512-snSuhcONR8xNX+Usuq3shckgiM1uxtrBLbNhiczHceXymkQdzueWJWAbAZlc9YktDoN58paVsz8Fc5AwJCkLxQ==',
      digest: '512-snSuhcONR8xNX+Usuq3shckgiM1uxtrBLbNhiczHceXymkQdzueWJWAbAZlc9YktDoN58paVsz8Fc5AwJCkLxQ==',
      algorithm: 'sha3',
      options: []
    }
  ]
}

because the algorithm should be sha3-512, rather than sticking the 512- onto the digest.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.